Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-36837 PoC — Zhongbang CRMEB 安全漏洞

Source
Associated Vulnerability
Title:Zhongbang CRMEB 安全漏洞 (CVE-2024-36837)
Description:Zhongbang CRMEB是中国西安众邦网络(Zhongbang)公司的一套开源的电商管理系统。 CRMEB v.5.2.2版本存在安全漏洞,该漏洞源于存在SQL注入漏洞,允许远程攻击者通过ProductController.php文件中的getProductList函数获取敏感信息。
Description
CVE-2024-36837 POC
Readme
# CVE-2024-36837 POC  
write URL in url.txt and run CVE-2024-36837.py  
![poc](https://github.com/phtcloud-dev/CVE-2024-36837/assets/151622760/fd8aa4de-9972-4be8-bda4-d0917f6ff686)

# CVE-2024-36837
In my freshman year, I found that an educational institution used CRMEB Mall as an online store in an Internet protection action. After testing, sql injection vulnerability was found. After setting up a local environment, the vulnerability was found in CRMEB version of CRMEB-KY v5.2.2 even higher  
  
Sqlmap: python sqlmap.py -u “http://XXX.URL/api/products?limit=20&priceOrder=&salesOrder=&selectId=0”  
Vulnerability code area  
File: website directory/app/API/controller/PC/ProductController. PHP  
![image](https://github.com/phtcloud-dev/CVE-2024-36837/assets/151622760/1a82c419-a200-4d8c-b5fb-1ee7bf4cbf58)  
In the getProductList function, passing arguments that are not validated or processed can easily result in the execution of malicious sql commands  
Suggested fixes:  
Using a web firewall  
Conduct regular security audits and vulnerability assessments to identify and mitigate potential security issues.  
Vendor URL: https://crmeb.com/  
Project making warehouse URL: https://github.com/crmeb/CRMEB/tree/master  
Vendor Information:  
Xi 'an Zhongbang network Technology Co., LTD  
西安众邦网络科技有限公司  
![image](https://github.com/phtcloud-dev/CVE-2024-36837/assets/151622760/ceb719e0-0d80-4d49-b9b9-d7d29ba3fb87)  
File Snapshot

[4.0K] /data/pocs/ab2bc1fb7578fd3da7563867eec27b85414ea240 ├── [1.1K] CVE-2024-36837.py └── [1.4K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.